The Ethics of Information Sharing Between the FBI and CIA

Size: px
Start display at page:

Download "The Ethics of Information Sharing Between the FBI and CIA"

Transcription

1 The Ethics of Information Sharing Between the FBI and CIA Nicholas Jones, Lauren Mallik, William McLaughlin, Dustin Toy Introduction Prior to the 9/11 attacks, the CIA was aware of the presence of two of the hijackers in the United States; for approximately 21 months, they had been identified as terrorists and confirmed to be living in the US. However, the FBI was unaware that they were supposed to be searching for these men. When an all points bulletin was issued on August 23, 2001 it was too late to effectively track them down. It has been speculated that had they been tracked sooner while they were inside the US, that their meetings with other hijackers could have easily lead their apprehension and potentially the thwarting of the 9/11 attacks. The process of sharing info between the agencies lead to the delay in pertinent knowledge, and indirectly contributed to the attacks ("Hijackers Trailed by CIA Before Attacks"). There are several agencies that focus on foreign threats to the USA, the foremost of which is the CIA, and of the several intelligence agencies that focus on domestic threats, the FBI is the foremost. Because of the difference in the nature of the mission of the several US intelligence agencies, a problem of intelligence oversight exists and restricts the flow of information to where it is most needed. Additionally, the changing patterns of international and domestic crime and terrorism play a large role in the issues of integration of information because it is increasingly more difficult to distinguish between the foreign and domestic threats. These factors suggest the US is up against an enemy which requires adaptation in the form of increased integration between foreign and domestic intelligence agencies if the US is to effectively combat these new threats. This adaptation implies that American citizens must give up privacy for an increase in security in return, which presents an ethical dilemma and forces policymakers and US citizens to determine whether privacy or security is valued higher. This paper will argue that the trade of privacy in return for security is an acceptable bargain,

2 implying that the US government should facilitate further integration between its intelligence agencies to prevent future terrorist attacks and combat international crime, because the result contributes to the common welfare of the nation, and in particular its safety. The ethical framework that will be used for analysis is the Common Good Approach which dictates that in order for anything to be ethical, it must promote the common good of the community. FBI and CIA: Legal Barriers to Sharing Information The CIA and FBI are two agencies which were initially created with specific and separate missions. This separation is to prevent a scenario of an all-powerful government agency which would have the powers of both domestic and foreign intelligence agencies. The intention was for the CIA to focus on gathering information on foreign countries, having no jurisdictional authority over citizens in the US or power to collect information on US citizens. The FBI was created to address crime and terrorism within the US, but also to the protect US from those trying to do harm to the US by addressing counterespionage and counter terrorism efforts. If the FBI is to collect information on US citizens, it must be done within the framework of the US law. There is a clear separation in the abilities and the obligations of the two agencies. The CIA has an array of intelligence gathering techniques such as satellite imagery capabilities and other methods of detecting information. The FBI or any other US law enforcement agency may not use satellites or any other detection devices on US citizens. The only way they may detect information on US citizens is to obtain the authority from US courts and then go about collecting the information in ways what comply with US law. The events that occurred on September 11, 2001, in a large part might have been prevented by increased information sharing between the CIA and the FBI. It is of course impossible to know for sure if the 9/11 attacks were preventable, but it is still important to analyze the failures and weaknesses in the intelligence and law enforcement system which allowed the attacks to occur. The 9/11 Commission Report, published in 2004, details the failure of the communication between the CIA and FBI. It is clear that both the FBI and the CIA had partial information on the activities of terrorist suspects as they

3 entered and left the United States and other countries. It was also argued that there were legal barriers that had prevented this knowledge from being shared. This was known as the wall by government agencies and was in place to prevent criminal investigations from using intelligence sources to gain warrants. The intent was to keep the spheres of power separate but this wall unintentionally went against the common good of those who were supposed to be protected by these two agencies. The laws have been retracted to some extent after the 9/11 attacks and there was discourse on whether the laws had been interpreted properly since their inception. There was a disjunction in intelligence where there were no laws for the official protocol requiring sharing of information. Recently, the mission of each respective agency has caused it to venture into the other's territory; however, despite this overlap, there has been an absence in information sharing between the two agencies. In order for the FBI to uphold the law and defend the Constitution, it must gather information on those suspected to be breaking the law. The CIA s mission is to "provide knowledge and take action to ensure the national security of the United States and the preservation of American life and ideals ("CIA Vision, Mission, and Values")." "To protect the United States from foreign intelligence and terrorist activities ("Hijackers Trailed Before Attacks")" which is part of the FBI mission statement, is very similar to the CIA's when we consider that the target of terrorists is the destruction of the American way of life and ideals. The FBI's investigations have led them to have an ever increasing global presence. This presence is required to help the war on terrorism which has become a central focus of the FBI s investigations. Although the FBI is still the lead agency for dealing with intelligence activities on American soil, they are working with a vast international campaign dedicated to defeating terrorism ("What we investigate"). This campaign is not the limit of the FBI s international presence and they currently have over fifty legal attaché offices, called legats, around the world ("Major Executive Speeches"). These are vital to the FBI s counter-terrorism efforts since they facilitate the flow of information between international law enforcement agencies. The FBI has also trained tens of thousands of operatives who work for other countries including Russia, Australia, and Saudi Arabia. These operatives have obtained information on more than

4 ten thousand suspected terrorists from over a dozen countries ("What We Investigate"). The FBI also focuses on investigating the flow of money that funds terrorist groups. The Bureau s Terrorism Financing Operations Section conducts this task which traces the lifeblood of their organizations (About Us- Quick Facts). The CIA s original and current roles are collecting intelligence abroad, providing analysis, and conducting covert actions. The CIA was created for gathering intelligence and was intended to have no enforcement capabilities due to a fear that the agency's actions would be illegal to use against American citizens per constitutional protections. Today the CIA works closely with many other national and international intelligence and enforcement agencies. This could be considered indirect enforcement power. This is not to say that the CIA has any legal power in the U.S., which was greatly feared, but they do influence the international community. Created in 1947, the CIA is lead by the Director of Central Intelligence (DCI). The Director of Central Intelligence's job is to be the president's advisor on national security matters. The function of the rest of the CIA is to assist the Director in this duty. It is that close relationship with the executive branch and its de facto enforcement capabilities that could lead the CIA to becoming too powerful of an agency. Additionally, with the ability to gather information that would benefit international FBI investigations, it makes sense to better facilitate communication of vital information. It is essential to rethink the structure of two of America s leading intelligence agencies to assure that they uphold the common good for the greatest number of citizens for which they are intended to protect. Recently, the FBI and CIA information sharing issues have reached a breaking point. With the current information sharing system, Counterintelligence-21, out of date, there is high demand for improved technology (CIA FBI Developing Super Computer). This flawed system does not share raw data; rather it allows interpretations of information to be transferred. Even s cannot be forwarded securely between agencies. Operatives must print a paper version and provide this to the counterpart who needs it ( Justice Department Fails to Address 9/11 ). Some steps have been taken to remedy this situation including various cooperation programs designed to elevate communication between the two agencies. For

5 example, after the USA PATRIOT act came into action, an initiative was laid out to get information flowing. This included the requirement of the Attorney General to turn over all foreign intelligence information obtained in any criminal investigation to the Director of the CIA, including the most sensitive grand jury information and wiretap intercepts ( Justice Department Fails to Address 9/11 ). Furthermore, it comes as no surprise that after months of criticism that they do not work well together, the CIA and FBI have begun jointly developing a new supercomputer system designed to improve their ability to both pull and share information ( About Us- Quick Facts ). This multimillion dollar project would entail a data-mining system that could be used to pool resources and information from both agencies in an effort to not be caught in the dark again. When completed, it will be imperative that this super system of the CIA and FBI s highly classified data be kept completely safeguarded from hackers, spies, leaks, and the like. If this indeed proves to be plausible, then our government agencies will be infinitely more effective in their capabilities to serve and protect this nation. The bottom line on the legality of sharing information is that what was once was discouraged and feared has become more and more legal over time. There were once laws and beaurucratic difficulties, but now this has become less of a factor. Still problems of the lack of information sharing between the CIA and the FBI persist, which many critiques have attributed to the cultural barriers between the two agencies. "The Wall": Cultural Barriers to Sharing Information The current conditions of international crime dictate that two agencies with the scopes that the FBI and CIA possess will invariably overlap intelligence gathering in their individual investigations. The overlap is a problem because there is a "wall" that exists between the two agencies. The "wall" refers to the cultural biases within each organization as well as the limited legally approved methods of data transfer between them and creates a de fact barrier to information sharing because it takes to much time and effort to share information. The agencies are not able to or are unwilling to share crucial information that could greatly help one another. In either case, this failure to communicate is unacceptable and does not represent the greatest good for the greatest number.

6 Over the past few years this wall has gotten worse ( Justice Department Fails to Address 9/11 ). Therefore, it is extremely difficult to coordinate agencies if they have different agendas and are not used to working together. In fact, the CIA and FBI are notorious for having a reluctance to share information. This is partly due to an efficacy issue where both sides want to be the responsible party for saving the day. Indeed there are other possible solutions to solving this qualm. For instance, The poster child of intelligence reform is a new agency called the National Counterterrorism Center, where officials from different agencies sit in the same room and draft collective reports. The center has even developed a classified website that provides synthesized terrorism intelligence for government officials (Zegart). If the CIA and FBI developed a relationship similar to this, then information swapping could be drastically accelerated and could potentially create a new standard for our country. In this sense, agents could operate collectively in person as well as post relevant news on the secure website for others to view. This cooperation would lead to an increase in safety for a greater number of Americans, at a very small cost. Further, it is important to reduce the barriers, because they slow down the agencies and make them less capable of reacting to the new threats and environment of international crime and terrorism. The New Threat When the CIA and the FBI were first set up in the US government, they faced a far different enemy than they face in today s world. In the 1960 s and the 1970 s there was a strong division between domestic and international threats to security considering the enemies were foreign countries. In this set up, the CIA and the FBI had clear scopes in which to focus their actions. Further, a high level of coordination would not be able to achieve substantial results, even if there was some minimal need of coordination. At the time these agencies were created, separation was the best way to uphold the greatest good for the greatest number of Americans. An emerging trend that is presented in recent discourse of international relations is the hypothesis that international war as we have seen in the past is no longer a threat in today s world (Muller). The argument is that countries have far more common good to

7 gain by participating in the economic integration of the world than in creating war. Of course, there are rogue nations such as Iran and North Korea that present a threat in the traditional senses, but the academics in this field would classify their leaders as mere criminals who have an illegitimate hold of power in their respective countries. This further supports the claim that the only conflict that exists in the world is criminals acting to further their gains whether it be though illicit trade, terrorism, etc. The implications of this argument has on information sharing between the government agencies is that the traditional threats the counter-espionage and espionage missions were created for no longer exist in the ways in which they did before. In addition to this new threat that has emerged and rendered the agencies less effect, a new environment has emerged which equally calls into question the aptitude of the current practices between the agencies to deal with international and domestic threats. A New Environment Recently, the world is changing at an ever accelerated pace because of globalization and the increases in technology. It is obvious that nation-states are highly integrated and the exchange of information is occurring at ever-increasing speeds. What is true for licit international dealings is closely reflected in illicit international dealing as well, including terrorism and crime. It is far easier today for terrorist and other groups to operate trans-nationally, not recognizing the borders that were once in place, because of trends in the ease and speed of the travel of information information. Given these trends in the state of transnational terrorism, it is clear that the agencies trying to protect US national security are at a disadvantage when trying to fight groups that recognize no borders because the agencies control and influence begin and end at international boundaries. Due to the changing world, these agencies must change in order to continue to promote the common good for those they are trying to protect. An example to demonstrate this would be to compare the old threats to the new threats. The old threat would be characterized by a Soviet secret agent who takes pictures of secret US documents and then physically carries them back to his homeland. Compare this to the threat of today. A man who holds US citizenship and is involved in Al Qaeda cells overseas uses his Blackberry to transmit schematics of relevant

8 infrastructure designs to terrorist planners in foreign countries to be used in bombing attacks. The US intelligence agency abroad attempts to trace the terrorist cells and their leadership back to members, many of which reside in the US. Obviously, the threat to US national security is far different than when the agencies were established and it is only common sense that there should be commensurate change to equip the agencies to deal with the threat. The way to do this is to do everything possible to facilitate information sharing between the CIA and FBI. Ethical Implications Because of the above discussion, it is clear that there needs to be increased integration between the FBI and CIA. But, because a large degree of the separation that exists between the two agencies is cultural in addition to legal, it implies that the magnitude of the integration must be greater than just sending over information. The two agencies must cooperate together and integrate in a way that counters the cultural barriers and makes their goals common between them. Creating this further integration would also crumble the divisions that were originally part of the structure of the separation of the agencies. Some may argue that it is a slippery slope and by further integrating the agencies, it is creating an agency which is too powerful, thus detracting the personal privacy from the government provided in the constitution. Because of the several trends in the above discussion, it is ethical give up the privacy protected in the past provided by the separation of the FBI and CIA in order to provide increased security. Because the type of threat the agencies combat and the environment in which the threats are being perpetrated have both changed since the inception of these agencies, it would provide for the common welfare of the US to further integrate the CIA and FBI. According to Santa Clara University's Applied Ethics Department, "the Greek philosophers have contributed the notion that life in community is a good in itself and our actions should contribute to that life this approach also calls attention to the common conditions that are important to the welfare of everyone (A Framework For Ethical Thinking). The common good, then, consists primarily of having the social systems, institutions, and environments on which we all depend work in a manner that benefits all

9 people. Using the common good approach, something must contribute to the common welfare of the community to be ethical. This makes it apparent that one ethical solution to the security threat is to better facilitate the distribution of gathered data between the agencies. With a shift in the intelligence community s focus and mission, this ethical framework implies that it is essential to improve the common good as well as to further the safety of the American populous. Since we are no longer defending against other countries, but rather groups of individual agents, some of whom are operating domestically, the common good dictates a better link between intelligence abroad and intelligence at home. The key point that must be emphasized: better security means nothing without the preservation of the American way of life. Ideally, any compromises should be considered for the overall effect as well as how different from the status quo it will be. Further, because the inherent separation between our intelligence agencies was created to prevent abuse, steps must be taken to ensure that abuse remains at a minimum. Increased information isn t a danger, but abuse of that information is. Ethically, we can only say that the increase of information is the right thing to have if there is a significant protection against abuses. Therefore there should be a system of checks and balances put in place to assure the rights of American citizens and prevent the abusive use of intelligence information. Perhaps by creating a new organization, it would be possible to have the integration of the two agencies without the possibility of the abuse of power. Solution: A New Organization The best option is a new intermediary organization that receives and distributes data to the various intelligence agencies. Ideally all information would be analyzed and categorized to determine who could best (or legally) utilize data that was gathered. This intermediary organization could have several channels of transmission based on expediency or urgency of the material. Things that were not deemed highly timesensitive could go through the normal bureaucratic channels, and things that were deemed crucial to national security could be pushed through before review. By allowing the information to flow freely, time-sensitive intelligence can be utilized to its full

10 potential and the efficiency of the system can increase. In order for there to be near freeflow of information, there is need for oversight and review. We propose an oversight board that would directly report to congress but that also works heavily with the American Civil Liberties Union. We believe that this combination would provide an appropriate level of accountability for the American people. With an oversight group observing all data transfers, it can be determined whether or not another user truly needs the data they were given, and further, whether or not a transfer was legal. By doing this, the truly important bits of data can rapidly be sent, and can minimize the time spent in bureaucracy increasing the greatest good for the greatest number. Obviously, there also needs to be a provision for teeth in the oversight group s abilities, to lay punitive actions onto any abusers by way of the department of justice. This manner of data sharing would increase the nation s security by allowing its FBI conduct its mission while receiving greatly needed assistance from the vast external intelligence gathering capability of the CIA. The ability to regulate and punish those who would abuse the process allows the cumulative good of this measure to stand up within the ethical framework. However, a consideration not to be overlooked here is that the CIA and FBI will be joining forces to an extent which could create the threat of a new superpower being born. Thus, due to the high risk involved with creating such a powerful information sharing system, questions of ethics come into play. The two agencies at hand were obviously created separately for a specific reason. Then again, with changing times and new threats to the public, intense collaboration of information is imperative in order to keep up with the information age that we live in. There definitely is a thin line to be crossed in this situation, yet if successful, this would be exactly what our country needs to better equip and protect itself for the future. Another possible solution would be to create a new agency tasked with the specific purpose of facilitating information flow between the CIA and FBI. This third agency would have no authority to use or act on the information, rather it would be charged with distributing necessary information to each agency. Thus, the new agency would act as the database for each, delegating information on a need to know basis, and bridging the gap between the CIA and FBI.

11 Any way you look at it, the CIA and FBI are currently struggling to protect our nation in an effective way. Without a doubt, they must work more closely together and pool resources to continue protecting American citizens. With an ever-changing enemy and mountains of information on them, it is imperative that we allow the proper agencies to obtain the necessary materials to efficiently prevent national disasters and promote the common good. Conclusion Given the current nature of threats to our country, and that the methods of protection have become dated, it is imperative that the CIA and FBI evolve to ensure the safety of our people. Because the recent trend of lessening the regulation between the two agencies, and the persistence of the barrier between them brought about by the cultural patters, it is essential to take large steps toward the direction of further integrating the agencies. Additionally, the threat the two agencies are up against and the environment they are fighting in is different from the time of the inception of the agencies, further implying the need for further integration. Ethically speaking, it is the right thing to do because it offers the greatest benefit for the greatest number of citizens because the increased security is beneficial because it allows Americans to live as they desire. It is true that the privacy of American citizens will be to some extent sacrificed, but it is for the common good of the community. Increased integration offers a way to get vital information to those who need it, and can better ensure that what happened on 9/11, or something worse, will never happen again. If integration is done properly, with oversight and review, it can be done with an emphasis on preserving the rights of American citizens. This must be done, as our rights are our way of life and our way of life is what terrorists would like to destroy. Works Cited A Framework For Ethically Thinking. Markkula Center For Applied Ethics 10 Feb Oct < About Us--Quick Facts. Federal Bureau Of Investigation 6 Mar Oct <

12 CIA, FBI Developing Intelligence Supercomputer. Global Security Newswire 12 Feb Sept < CIA Vision, Mission, And Values. Central Intelligence Agency 27 Jul Oct < Hijackers Trailed By CIA Before Attacks. Guardian Unlimited Special Reports 3 Jun Oct < Justice Department Fails to Address 9/11 Intelligence Failures. Center for National Security Studies 19 Apr Sept < Major Executive Speeches John E. Lewis. Federal Bureau Of Investigation 14 Mar Oct < Mueller, John. The Remnants of War. Cornell University Press: What We Investigate. Federal Bureau Of Investigation 4 Oct Sept < Zegart, Amy. American Intelligence--Still Stupid. Los Angeles Times Online 17 Sept Oct <

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents

More information

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21283 Updated August 6, 2003 CRS Report for Congress Received through the CRS Web Homeland Security: Intelligence Support Richard A. Best, Jr. Specialist in National Defense Foreign Affairs,

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

The Need to Share: The U.S. Intelligence Community and Law Enforcement

The Need to Share: The U.S. Intelligence Community and Law Enforcement The Need to Share: The U.S. Intelligence Community and Law Enforcement A White Paper prepared by the AFCEA Intelligence Committee April 2007 Serving Intelligence Professionals and their Community The Need

More information

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony

GAO COMBATING TERRORISM. Observations on Options to Improve the Federal Response. Testimony GAO For Release on Delivery Expected at 3:00 p.m. Tuesday, April 24, 2001 United States General Accounting Office Testimony Before the Subcommittee on Economic Development, Public Buildings, and Emergency

More information

Department of Homeland Security Information Sharing Strategy

Department of Homeland Security Information Sharing Strategy Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

The Department of the Treasury established the Financial Crimes

The Department of the Treasury established the Financial Crimes Appendix A Financial Crimes Enforcement Network Programs The Department of the Treasury established the Financial Crimes Enforcement Network in April 1990. 33 FinCEN s original mission was to establish

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

Thank you for the opportunity to join you here today.

Thank you for the opportunity to join you here today. Ambassador Daniel A. Sepulveda Remarks on the U.S. Privacy Framework and Signals Intelligence Reforms November 3, 2015 Digital Europe Brussels, Belgium Thank you for the opportunity to join you here today.

More information

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Domestic Intelligence Eric Rosenbach and Aki J. Peritz Domestic Intelligence Unlike many nations, the United States does not have

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Bush Lets U.S. Spy on Callers Without Courts

Bush Lets U.S. Spy on Callers Without Courts Page 1 of 5 Article 1 NYTimes.com Go to a Section Welcome, 75200 - Membe NYT Since 1981 Bush Lets U.S. Spy on Callers Without Courts Advertisement By JAMES RISEN and ERIC LICHTBLAU Published: December

More information

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat

More information

CITIZEN ADVOCACY CENTER

CITIZEN ADVOCACY CENTER CITIZEN ADVOCACY CENTER The USA PATRIOT Act Post-9/11 Due Process LESSON PLAN AND ACTIVITIES All rights reserved. No part of this lesson plan may be reproduced in any form or by any electronic or mechanical

More information

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY Section II Privacy and Legislation 1 Privacy and Legislation Privacy Definition What is privacy? The Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects,

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

Vulnerabilities in the U.S. Passport System Can Be Exploited by Criminals and Terrorists

Vulnerabilities in the U.S. Passport System Can Be Exploited by Criminals and Terrorists Statement of Michael Johnson Former Special Agent in Charge, Miami Field Office, Diplomatic Security Service United States Department of State Before the U.S. Senate Homeland Security and Governmental

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Technical Questions on Data Retention

Technical Questions on Data Retention Technical Questions on Data Retention 1) The list of data in the annex of the proposed Directive on Data retention is practically identical to the information required in the Council draft Framework Decision.

More information

How safe is the American homeland?

How safe is the American homeland? The Oxford Council on Good Governance OCGG Security Section Advice Program US Foreign, Security, and Defence Policy Governance Area US Security Policy You may not be interested in war, but war is interested

More information

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. . SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq. The Patriot Act was signed into law by President George W. Bush on October 26, 2001. It passed in the Senate by a vote

More information

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note

Principles of Oversight and Accountability For Security Services in a Constitutional Democracy. Introductory Note Principles of Oversight and Accountability For Security Services in a Constitutional Democracy Introductory Note By Kate Martin and Andrzej Rzeplinski The 1990 s saw remarkable transformations throughout

More information

Hearing before the Senate Committee on the Judiciary Subcommittee on Oversight, Agency Action, Federal Rights and Federal Courts On

Hearing before the Senate Committee on the Judiciary Subcommittee on Oversight, Agency Action, Federal Rights and Federal Courts On Hearing before the Senate Committee on the Judiciary Subcommittee on Oversight, Agency Action, Federal Rights and Federal Courts On The War on Police: How the Federal Government Undermines State and Local

More information

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 09-36 September 2009 THE FEDERAL

More information

The Design of an Undergraduate Program In Homeland Security

The Design of an Undergraduate Program In Homeland Security VOLUME 6, NUMBER 1, 2012 The Design of an Undergraduate Program In Homeland Security Jon E. Travis Professor Director, Higher Ed Doctoral Program Director, Center for Community College Education Department

More information

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE HOMELAND SECURITY COMMITTEE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE AND SUBCOMITTEE ON

More information

HOMELAND SECURITY INTELLIGENCE RPAD 556

HOMELAND SECURITY INTELLIGENCE RPAD 556 HOMELAND SECURITY INTELLIGENCE RPAD 556 Dr. James E. Steiner Public Service Professor Rockefeller College The University at Albany, SUNY 423 State Street 518 708 4183 Office hours: by appointment Course

More information

INTELLIGENCE AND ANALYSIS

INTELLIGENCE AND ANALYSIS OFFICE OF INTELLIGENCE AND ANALYSIS U.S. DEPARTMENT OF THE TREASURY WORKING AT OIA OIA S MISSION POSITION DESCRIPTIONS BENEFITS & CONTACT INFORMATION working at oia OIA officers support the formulation

More information

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE

UNCLASSIFIED JOINT UNCLASSIFIED STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE JOINT STATEMENT OF ROBERT S. LITT GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE STUART J. EVANS DEPUTY ASSISTANT ATTORNEY GENERAL FOR INTELLIGENCE NATIONAL SECURITY DIVISION DEPARTMENT

More information

Healthcare Applications and HIPAA. BA590-IT Governance Final Term Project Prof. Mike Shaw

Healthcare Applications and HIPAA. BA590-IT Governance Final Term Project Prof. Mike Shaw Healthcare Applications and HIPAA BA590-IT Governance Final Term Project Prof. Mike Shaw Michael McIntosh 5/4/2007 Table of Contents 1. Abstract 3 2. Introduction 3 3. Section 1: HIPAA definition and history

More information

OPEN ACCESS, PRIVACY AND HACKER CULTURE

OPEN ACCESS, PRIVACY AND HACKER CULTURE OPEN ACCESS, PRIVACY AND HACKER CULTURE An Inside Higher Ed webinar with Tracy Mitrano Director of IT policy and the Institute for Internet Culture Policy and Law at Cornell University October 2, 2013

More information

A Critique of President Obama s Reforms of U.S. Intelligence

A Critique of President Obama s Reforms of U.S. Intelligence CENTER FOR SECURITY POLICY OCCASIONAL PAPER SERIES A Center for Security Policy Analysis Fred Fleitz and Clare Lopes 1/27/2014 Fred Fleitz served in U.S. national security positions for 25 years at the

More information

THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING

THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING Arwen Mullikin 1 and Syed (Shawon) M. Rahman 2 1 Graduate Student, Capella University 225 South 6th Street, 9th Floor Minneapolis, MN 55402, USA Email:

More information

working group on foreign policy and grand strategy

working group on foreign policy and grand strategy A GRAND STRATEGY ESSAY Managing the Cyber Security Threat by Abraham Sofaer Working Group on Foreign Policy and Grand Strategy www.hoover.org/taskforces/foreign-policy Cyber insecurity is now well established

More information

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in 1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies

More information

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen

More information

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE

TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Select Committee on Homeland Security U.S. House of Representatives "Information Sharing

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Criminal Justice Sector and Rule of Law Working Group

Criminal Justice Sector and Rule of Law Working Group Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE

JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE JOINT STATEMENT OF ELISEBETH COLLINS COOK ASSISTANT ATTORNEY GENERAL AND VALERIE CAPRONI GENERAL COUNSEL FEDERAL BUREAU OF INVESTIGATION BEFORE THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE

More information

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the

CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the CROATIAN PARLIAMENT Pursuant to Article 88 of the Constitution of the Republic of Croatia, I hereby pass the DECISION PROMULGATING THE ACT ON THE SECURITY INTELLIGENCE SYSTEM OF THE REPUBLIC OF CROATIA

More information

USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties?

USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties? USA PATRIOT ACT: Protecting National Security or Violating Civil Liberties? Historical Thinking Skills Assessed: Sourcing, Critical Reading, Corroboration Author/School/System: Matt Hipszer, Howard County

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

Federal Bureau of Investigation s Integrity and Compliance Program

Federal Bureau of Investigation s Integrity and Compliance Program Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established

More information

Federal Bureau of Investigation

Federal Bureau of Investigation Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United

More information

IN THE WAR ON TERRORISM

IN THE WAR ON TERRORISM THURSDAY, SEPTEMBER 19, 2002 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 FACT SHEET OVERVIEW OF INFORMATION SHARING INITIATIVES IN THE WAR ON TERRORISM Information Is the Best Friend of Prevention...

More information

National Security Agency

National Security Agency National Security Agency 9 August 2013 The National Security Agency: Missions, Authorities, Oversight and Partnerships That s why, in the years to come, we will have to keep working hard to strike the

More information

United States House of Representatives United States House of Representatives. Washington, DC 20515 Washington, DC 20515

United States House of Representatives United States House of Representatives. Washington, DC 20515 Washington, DC 20515 April 17, 2015 The Honorable John Boehner The Honorable Nancy Pelosi Speaker of the House Democratic Leader United States House of Representatives United States House of Representatives H-232, U.S. Capitol

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!

More information

148 Summaries Intelligence services in Europe and America; the reorientation since the collapse of the Berlin wall and September 11th 2001

148 Summaries Intelligence services in Europe and America; the reorientation since the collapse of the Berlin wall and September 11th 2001 148 Summaries Justitiële verkenningen (Judicial explorations) is published nine times a year by the Research and Documentation Centre of the Dutch Ministry of Justice in cooperation with Boom Juridische

More information

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique

Second Cyber Security Summit, November 11, 2013 in Bonn Final communique Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference

More information

Statement for the Record by. Dr. Donald M. Kerr. Director, National Reconnaissance Office, Nominee for the Position of

Statement for the Record by. Dr. Donald M. Kerr. Director, National Reconnaissance Office, Nominee for the Position of Statement for the Record by Dr. Donald M. Kerr Director, National Reconnaissance Office, Nominee for the Position of Principal Deputy Director of National Intelligence, before the Senate Select Committee

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today.

Mr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today. Request for an Opinion by the European Parliament, draft EU-Canada PNR agreement (Opinion 1/15) Hearing of 5 April 2016 Pleading notes of the European Data Protection Supervisor (EDPS) Mr President, Ladies

More information

Pursuant to section 1.7(i) of Executive Order 12333, as amended, the FBI is authorized to:

Pursuant to section 1.7(i) of Executive Order 12333, as amended, the FBI is authorized to: PRESIDENTIAL POLICY DIRECTIVE 28 POLICIES AND PROCEDURES I. Introduction Presidential Policy Directive 28 regarding signals intelligence activities (hereinafter PPD-28 ), issued January 17, 2014, articulates

More information

U.S. Department of Justice

U.S. Department of Justice U.S. Department of Justice Federal Bureau of Investigation Office of the Director Washington, D.C. 20535-0001 February 1,2013 The Honorable Barbara A. Mikulski Chairwoman Senate Appropriations Committee

More information

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS

TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS TIA AND MATRIX: FUNCTIONS, BENEFITS, AND BARRIERS Joe Juidiciani Daniel Snyder BACKGROUND On September 11, 2001, our nation fell victim to the largest attack on United States soil since the birth of the

More information

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND

TOP SECRET//COMINT//NOFORN JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND All redacted information exempt under (b)(1) and (b) (3) except as otherwise noted. JOINT STATEMENT FOR THE RECORD BY MICHAEL LEITER DIRECTOR NATIONAL COUNTERTERRORISM CENTER AND ASSOCIATE DEPUTY DIRECTOR

More information

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:

More information

Working with the Federal Government on Cybersecurity

Working with the Federal Government on Cybersecurity O B S I D I A N C Y B E R S E C U R I T Y O C C A S I O N A L P A P E R Working with the Federal Government on Cybersecurity Preparation is Key to Success December 5, 2013 Table of Contents CONSIDER THIS...

More information

Australia s counter-terrorism laws

Australia s counter-terrorism laws Australia s counter-terrorism laws & Questions and answers OFFENCES This pamphlet is a reference to help explain Australia s counter-terrorism laws. There are five main sections to this pamphlet: Terrorist

More information

Intelligence Analysis for Homeland Security RPAD 557

Intelligence Analysis for Homeland Security RPAD 557 Intelligence Analysis for Homeland Security RPAD 557 Instructor: Dr. James E. Steiner Public Service Professor Rockefeller College SUNY Albany 518-708-4183 Office hours: by appointment 423 State Street

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development 7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing

More information

Cybersecurity. Canisius College

Cybersecurity. Canisius College Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never

More information

FAQs Organised Crime and Anti-corruption Legislation Bill

FAQs Organised Crime and Anti-corruption Legislation Bill FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised

More information

Main Page Search August 25, 2010

Main Page Search August 25, 2010 1 of 6 8/25/2010 5:22 PM Main Page Search August 25, 2010 Association News Features/Substantive Law Spotlight/Profiles Departments Classifieds The Hennepin Lawyer Kenneth Ross August 24, 2010 Headlines

More information

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY Page0 Page1 Available as of January 1, 2014 Law Enforcement / Public Safety Courses Introduction to Terrorism Terrorism can range from complex plots to small scale attacks and can take many forms. Often,

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

RECOMMENDATION CONCERNING THE PROTECTION AND PROMOTION OF MUSEUMS AND COLLECTIONS, THEIR DIVERSITY AND THEIR ROLE IN SOCIETY

RECOMMENDATION CONCERNING THE PROTECTION AND PROMOTION OF MUSEUMS AND COLLECTIONS, THEIR DIVERSITY AND THEIR ROLE IN SOCIETY RECOMMENDATION CONCERNING THE PROTECTION AND PROMOTION OF MUSEUMS AND COLLECTIONS, THEIR DIVERSITY AND THEIR ROLE IN SOCIETY Paris, 20 November 2015 UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL

More information

2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy

2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy Professor Clive Walker School of Law, University of Leeds Inquiry into section 35P of the Australian Security Intelligence Organisation Act 1979 Submission to the Independent Security Law Monitor 3 April

More information

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1 US Intelligence Community 2005-6 Thomas Patrick Carroll 1 Policy (defn): (a) General course of action, selected from among alternatives, intended to guide present and future decisions. (b) A highlevel

More information

Computer Science 199r. CALEA, The USA PATRIOT Act, and VoIP: Privacy Concerns with Next Generation Telephony

Computer Science 199r. CALEA, The USA PATRIOT Act, and VoIP: Privacy Concerns with Next Generation Telephony Computer Science 199r CALEA, The USA PATRIOT Act, and VoIP: Privacy Concerns with Next Generation Telephony Pierce Tria May 14, 2007 Privacy Concerns with Next Generation Telephony I. CALEA and The USA

More information

The threats which were perceivable 20 years ago differ greatly from our ever increasing

The threats which were perceivable 20 years ago differ greatly from our ever increasing 1 Introduction The threats which were perceivable 20 years ago differ greatly from our ever increasing interconnected world of the present. With these new found risks there becomes the need for a different

More information

FINAL // FOR OFFICIAL USE ONLY. William Noonan

FINAL // FOR OFFICIAL USE ONLY. William Noonan FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States

More information

QUICKSTART RULES Turn Order Rolling Dice 10s Damage Number Caps

QUICKSTART RULES Turn Order Rolling Dice 10s Damage Number Caps QUICKSTART RULES The actual rules of Terror Network are a little more involved, but here is a simplified rules section to get you started. Terror Network puts you into the role of a counter-terrorism agent.

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Criminal Justice Courses

Criminal Justice Courses Criminal Justice Courses Course ID Course Title Credits CJ-100 Introduction to Criminal Justice and Administration 3 CJ-110 Criminal Law 3 CJ-120 Introduction to Law and the Court Systems 3 PSY-100 Essentials

More information

Setting the Record Straight: U.S. Department of Homeland Security Policies on Protecting Privacy. Lauren Saadat and Shannon Ballard 1

Setting the Record Straight: U.S. Department of Homeland Security Policies on Protecting Privacy. Lauren Saadat and Shannon Ballard 1 Setting the Record Straight: U.S. Department of Homeland Security Policies on Protecting Privacy Lauren Saadat and Shannon Ballard 1 As published in the November 2007 issue of Data Protection Law & Policy

More information

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy

Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy Research Note The Fight to Define U.S. Cybersecurity and Information Sharing Policy By: Dan Arnaudo Copyright 2013, ASA Institute for Risk & Innovation Keywords: Congress, CISPA, Critical Infrastructure,

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Training Courses Catalog 2015

Training Courses Catalog 2015 Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction

More information

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C.

CATO HANDBOOK CONGRESS FOR POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS. Washington, D.C. CATO HANDBOOK FOR CONGRESS POLICY RECOMMENDATIONS FOR THE 108TH CONGRESS Washington, D.C. 6. Homeland Security Congress should monitor closely the implementation of the new Department of Homeland Security

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

GOOD SECURITY IS A GROUP EFFORT

GOOD SECURITY IS A GROUP EFFORT THE OFFICE OF SECURITY Operations Security (OPSEC) GOOD SECURITY IS A GROUP EFFORT Operations Security (OPSEC) "Even minutiae should have a place in our collection, for things of a seemingly trifling nature,

More information

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report

Introducing Tumblr s Calendar Year 2013 Law Enforcement Transparency Report Introducing Tumblr s Calendar Year Law Enforcement Transparency Report At Tumblr, we believe it s important to provide everyone from occasional visitors to our most active community members with an open,

More information

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE

CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE Représentant les avocats d Europe Representing Europe s lawyers CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION DIRECTIVE CCBE RECOMMENDATIONS FOR THE IMPLEMENTATION OF THE DATA RETENTION

More information

Financial Crimes Enforcement Network

Financial Crimes Enforcement Network Fiscal Years 2008 2012 Financial Crimes Enforcement Network Table of Contents Message from the Director 1 Introduction 3 The Bank Secrecy Act 4 The Nation s Financial Intelligence Unit 5 Mission Statement

More information

INTELLIGENCE ANALYSIS Criminal Justice 380 Course Syllabus Spring 2010

INTELLIGENCE ANALYSIS Criminal Justice 380 Course Syllabus Spring 2010 INTELLIGENCE ANALYSIS Criminal Justice 380 Course Syllabus Spring 2010 Instructor: Mr. Albert Sproule. Phone: 610-282-1100, x-1463 E-mail Address: Albert.Sproule@desales.edu. Office Hours Office Hours:

More information

(unofficial English translation)

(unofficial English translation) REGULATION ON PREVENTION OF MONEY LAUNDERING AND FINANCING OF TERRORISM FOR MONEY TRANSFER BUSINESSES AND MONEY CHANGING BUSINESSES (unofficial English translation) REGULATION ON PREVENTION OF MONEY LAUNDERING

More information

provisions specified by the Preventive Law, the Cabinet of Ministers of Azerbaijan Republic has adopted the following decisions:

provisions specified by the Preventive Law, the Cabinet of Ministers of Azerbaijan Republic has adopted the following decisions: REPORT of the Financial Monitoring Service under the Central Bank of the Republic of Azerbaijan on execution of The 2007-2011 Action Plan for implementation of the National Strategy for Combatting Corruption

More information

ADDRESSES SYSTEM LOCATION

ADDRESSES SYSTEM LOCATION Volume 80, Number 28 Wednesday, February 11, 2015 Public Notice 9034; Pages 7671 Privacy Act; System of Records: Medical Records, State-24 SUMMARY: Notice is hereby given that the Department of State proposes

More information